DOCS: keyword tag updates (#2922)

* replace "zero-trust" with "zero trust"

* fix and update all keyword tags
This commit is contained in:
Alex Fornuto 2022-01-11 12:36:47 -06:00 committed by GitHub
parent 3c87751c41
commit 64d50613af
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
54 changed files with 86 additions and 75 deletions

View file

@ -3,10 +3,10 @@ title: AdGuard
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy adguard ad-guard pi-hole piehole
content: pomerium, identity access proxy, adguard, ad guard, pi hole, piehole
description: >-
This guide covers how to add authentication and authorization to a hosted,
fully, online instance of adguard.
fully, online instance of Adguard.
---
# Securing AdGuard Home

View file

@ -3,7 +3,7 @@ title: Argo
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy argo argo-cd
content: pomerium, identity access proxy, argo, cd, continuous deployment
description: >-
This guide covers how to add authentication and authorization to an instance
of argo.

View file

@ -3,7 +3,7 @@ title: Cloud Run
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy gcp google iap serverless cloudrun
content: pomerium, identity access proxy, gcp, google, iap, serverless, cloudrun
description: >-
This guide covers how to deploy Pomerium to Cloud Run and use it to protect
other endpoints via Authorization Headers.

View file

@ -4,8 +4,8 @@ lang: en-US
meta:
- name: keywords
content: >-
pomerium identity-access-proxy visual-studio-code visual studio code
authentication authorization
pomerium, identity access proxy, visual studio code,
authentication, authorization
description: >-
This guide covers how to add authentication and authorization to a hosted,
fully, online instance of visual studio code.

View file

@ -4,8 +4,8 @@ lang: en-US
meta:
- name: keywords
content: >-
pomerium identity-access-proxy webauthn device id enroll
authentication authorization
pomerium, identity access proxy, webauthn, device id, enroll, enrollment,
authentication, authorization
description: >-
This guide covers how to enroll a trusted execution environment device as a Pomerium end-user.
---

View file

@ -4,8 +4,8 @@ lang: en-US
meta:
- name: keywords
content: >-
pomerium identity-access-proxy gitlab gitlab-ee docker
authentication authorization
pomerium, identity access proxy, gitlab, gitlab-ee, docker,
authentication, authorization, self-hosted
description: >-
This guide covers how to secure self-hosted GitLab behind Pomerium, providing authentication and authorization through your IdP.
---

View file

@ -4,8 +4,8 @@ lang: en-US
meta:
- name: keywords
content: >-
pomerium identity-access-proxy data logging graphing grafana
authentication authorization
pomerium, identity access proxy, data, logging, graphing, grafana,
authentication, authorization
description: >-
This guide covers how to use Pomerium to authenticate and authorize users of Grafana.
---

View file

@ -3,7 +3,7 @@ title: JWT Verification
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy envoy jwt
content: pomerium, identity access proxy, envoy, jwt,
description: >-
This example demonstrates how to verify the Pomerium JWT assertion header using Envoy.
---
@ -11,7 +11,7 @@ description: >-
# JWT Verification
This example demonstrates how to verify the [Pomerium JWT assertion header](https://www.pomerium.io/reference/#pass-identity-headers) using [Envoy](https://www.envoyproxy.io/). This is useful for legacy or 3rd party applications which can't be modified to perform verification themselves.
This guide is a practical demonstration of some of the topics discussed in [Mutual Authentication: A Component of Zero-Trust].
This guide is a practical demonstration of some of the topics discussed in [Mutual Authentication: A Component of Zero Trust].
## Requirements
- [Docker](https://www.docker.com/)
@ -239,6 +239,6 @@ You should now be able to run the example with:
[httpbin.localhost.pomerium.io]: https://verify.localhost.pomerium.io
[Local Development with Wildcard DNS on Linux]: https://sixfeetup.com/blog/local-development-with-wildcard-dns-on-linux
[Local Development with Wildcard DNS]: https://blog.thesparktree.com/local-development-with-wildcard-dns
[Mutual Authentication: A Component of Zero-Trust]: /docs/topics/mutual-auth.md
[Mutual Authentication: A Component of Zero Trust]: /docs/topics/mutual-auth.md
[Mutual Authentication With a Sidecar]: /docs/topics/mutual-auth.md#mutual-authentication-with-a-sidecar
[verify.localhost.pomerium.io]: https://verify.localhost.pomerium.io

View file

@ -3,7 +3,7 @@ title: Kubernetes Dashboard
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy kubernetes helm k8s oauth dashboard
content: pomerium, identity access proxy, kubernetes, helm, k8s, oauth, dashboard,
description: >-
This guide covers how to add authentication and authorization to kubernetes dashboard using single-sing-on, pomerium, helm, and letsencrypt certificates.
---

View file

@ -3,7 +3,7 @@ title: Kubernetes API / Kubectl
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy kubernetes helm k8s oauth
content: pomerium, identity access proxy, kubernetes, helm, k8s, oauth
description: >-
This guide covers how to add authentication and authorization to kubernetes apiserver using single-sing-on and pomerium.
---

View file

@ -3,7 +3,7 @@ title: Local OIDC Provider
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy oidc
content: pomerium, identity access proxy, oidc, identity provider, idp
description: >-
This guide covers how to use Pomerium with a local OIDC provider using [qlik/simple-oidc-provider].
---

View file

@ -3,7 +3,7 @@ title: Client-Side mTLS
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy mtls client-certificate
content: pomerium, identity access proxy, mtls, client certificate, mutual authentication
description: >-
This guide covers how to use Pomerium to implement mutual authentication
(mTLS) for end-users, using client certificates with a custom certificate authority.

View file

@ -3,7 +3,7 @@ title: Nginx
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy nginx
content: pomerium, identity access proxy, nginx
description: >-
This guide covers how to use Pomerium to protect services behind an nginx
proxy.

View file

@ -3,7 +3,7 @@ title: Synology
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy synology docker
content: pomerium, identity access proxy, synology, docker, dsm, nas
---
# Synology

View file

@ -3,7 +3,7 @@ title: TCP Services
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy ssh tcp postgres database redis mysql
content: pomerium, identity access proxy, ssh, tcp, postgres, database, redis, mysql
description: >-
This guide covers how to use Pomerium to protect TCP services such as SSH, Postgres and Redis.
---

View file

@ -3,7 +3,7 @@ title: TiddlyWiki
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy wiki tiddlywiki
content: pomerium, identity access proxy, wiki, tiddlywiki
description: >-
This guide covers how to add authentication and authorization to a hosted, fully, online instance of TiddlyWiki.
---

View file

@ -3,7 +3,7 @@ title: Traefik Ingress
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy traefik kubernetes forwardauth forward-auth external helm k8s ingress
content: pomerium, identity access proxy, traefik, kubernetes, forwardauth, forward auth, external, helm, k8s, ingress
description: >-
This guide covers how to use Pomerium to secure Traefik when used as a Kubernetes Ingress Controller
---

View file

@ -4,7 +4,7 @@ lang: en-US
meta:
- name: keywords
content: >-
pomerium bittorrent torrent pomerium identity-access-proxy transmission-daemon transmission authentication authorization
pomerium, bittorrent, torrent, identity access proxy, transmission-daemon, transmission, authentication, authorization
description: >-
Learn how to use Pomerium as an authentication and authorization proxy for a Transmission torrent daemon.
---

View file

@ -3,7 +3,7 @@ title: Upstream mTLS
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy mtls client-certificate
content: pomerium, identity access proxy, mtls, client certificate, mutual authentication
description: >-
This guide covers how to configure Pomerium to provide mutual authentication
(mTLS) to an upstream service, using client certificates with a custom certificate authority.
@ -11,7 +11,7 @@ description: >-
# Upstream mTLS With Pomerium
Part of a complete zero-trust security model is secure communication between your identity-aware access proxy (Pomerium) and the upstream service it provides access to. This means both Pomerium *and* the upstream service will authenticate each other.
Part of a complete zero trust security model is secure communication between your identity-aware access proxy (Pomerium) and the upstream service it provides access to. This means both Pomerium *and* the upstream service will authenticate each other.
Pomerium confirms the identity of an upstream service by the TLS certificate it serves. See [`tls_custom_ca_file`] and [`tls_server_name`] for more information on configuring Pomerium to accept an upstream's TLS certificate.